SlideShare uma empresa Scribd logo
1 de 24
GL

BAL

Institute of Information Technology
A Presentation on
Computer Virus

Group Name:- G3
Group Members :-

Rohitash kumar
Rahul Baghla
Ravikant Verma
Contents

:-

 What is a virus
 Types of virus
 Indications of Virus Attack
 Creating a virus


Protecting from virus



Remove some common virus



Conclusion
What is a virus?
• A computer virus is a computer program that can
copy itself and infect a computer without permission or
knowledge of the user.
• A virus can only spread from one computer to another
when its host is taken to the uninfected computer, for
instance by a user sending it over a network or the
Internet, or by carrying it on a removable medium such
as a floppy disk, CD, or USB drive.
Types of Viruses
 Trojan Horse

 Memory Resident Virus

 Worms

 Root kit Virus

 Boot sector Virus

 Polymorphic Virus

 Macro Virus

 Logic Bombs
What are Trojan Horses ?
• A Trojan horse is a computer program that is hiding a
virus or other potentially damaging program. A
Trojan horse can be a program that purports to do one
action when, in fact, it is performing a malicious
action on your computer. Trojan horses can be
included in software that you download for free or as
attachments in email messages.
What is a Worm?
• A computer worm is a self-replicating computer program.
It uses a network to send copies of itself to other nodes
(computer terminals on the network) and it may do so
without any user intervention.
• Unlike a virus, it does not need to attach itself to an
existing program. Worms almost always cause harm to the
network, if only by consuming bandwidth, whereas viruses
almost always corrupt or modify files on a targeted
computer.
Boot Sector Virus :-

A boot sector virus infects boot
sector of computers. During system boot, boot sector virus is
loaded into main memory and destroys data stored in hard
disk.

Macro Virus :-

Macro viruses are viruses that use another
application's macro programming language to distribute themselves. They
infect documents such as MS Word or MS Excel and are typically spread
to other similar documents.
Memory Resident Virus :-

Memory Resident Viruses reside in a computers
volatile memory (RAM). They are initiated from a virus which runs on the
computer and they stay in memory after it's initiating program closes.

Root kit Virus :A root kit virus is an undetectable virus which
attempts to allow someone to gain control of a computer system. The term
root kit comes from the Linux administrator root user. These viruses are
usually installed by Trojans and are normally disguised as operating
system files.
Polymorphic Virus :Polymorphic viruses contain complex
instructions that enable them to mutate into new and different viruses.
This makes it impossible for anti-viruses to find them using string or
signature searches (because they are different in each encryption). The
virus then goes on creating a large number of copies.

Logic Bombs :Logic bombs are often attached to a working
program but do not replicate. They are only executed when a certain
predefined condition is met. Their objective is to destroy data on the
computer once certain conditions have been met.
Indications of Virus Attack
 Computer runs slower then usual
 Computer no longer boots up
 Screen sometimes flicker
 PC speaker beeps periodically
 System crashes for no reason
 Files/directories sometimes disappear
How To Create a Virus
As we know, Virus is nothing it
is just a program which are created for
malicious purpose. If it occurs in a
system & user is unaware of from it
then it can destroy or damage our
system.
Continued..
Open Notepad and write the following code
@Echo off
Start virus.bat
virus.bat
save it as .bat and run it.
It will hang our computer & we have to shut
down the computer forcibly...
Protection from Virus
 Install reliable anti-virus software
 Update our anti-virus software regularly
 Don't automatically open attachments
 Scan all incoming email attachments
 Delete chain emails and junk email
 Be careful when downloading files from the Internet
Continued…
 Always scan new files for viruses before we use them
 Backup our files on a regular basis
 If our computer is on a network, make sure we have
security steps in place to prevent unauthorized users
putting files on our computer
 Take care using USB flash cards, CDs, zip and floppy
disks
Examples of risky file types :• The following file types should be treated with
suspicion and be confirmed with the sender before
being opened:
– .exe
– .bat
– .vbs
Remove Some Common Viruses
• We can remove some of the common viruses
without help of any antivirus Program.
• e.g.- New Folder.exe
• Autorun.inf ( from PDs etc)
New Folder.exe
• It looks just like an folder but
actually it is a .exe file.
• Try to deleting the file.
• It will delete if you haven’t
executed it, if you’re unable
to delete it.
• Go to Task manager ( by
pressing ctrl+shift+esc )
Continued …
 Go to Process Tab and try
finding that the process for
the exe file and end the
process.
 Then Go to the same folder
containing the exe file and
delete it.
 Then Open Search and try
finding the .exe files of same
size and delete them all.
Removal of Autorun.inf
• Open Run dialog Box. Type in “CMD” press
ENTER.
Continued …
• The Command Prompt will Open Now. In Command
prompt go to the drive containing Autorun.inf
• Now Type In “ attrib –h –s –a” and press enter.
Continued …
• This will remove drives attributes for all Hidden,
System files.
• Now Type “ Del autorun.inf” and press ENTER.
• The Virus has been Successfully Removed.
“It is good to be aware of
viruses rather than being
sorry…..”
Thank You !!

Any Queries ??

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 

Destaque

Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationN V Amruth Varma
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

Destaque (9)

Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
The Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint PresentationThe Ebola Virus - Powerpoint Presentation
The Ebola Virus - Powerpoint Presentation
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Semelhante a Computer virus

Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | ExplainationBipulok
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 

Semelhante a Computer virus (20)

Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus project
Virus projectVirus project
Virus project
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus
VirusVirus
Virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Mais de Rahul Baghla

Mais de Rahul Baghla (10)

Holography
HolographyHolography
Holography
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Hacking
HackingHacking
Hacking
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Computer virus

  • 2. A Presentation on Computer Virus Group Name:- G3 Group Members :- Rohitash kumar Rahul Baghla Ravikant Verma
  • 3. Contents :-  What is a virus  Types of virus  Indications of Virus Attack  Creating a virus  Protecting from virus  Remove some common virus  Conclusion
  • 4. What is a virus? • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. • A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 5. Types of Viruses  Trojan Horse  Memory Resident Virus  Worms  Root kit Virus  Boot sector Virus  Polymorphic Virus  Macro Virus  Logic Bombs
  • 6. What are Trojan Horses ? • A Trojan horse is a computer program that is hiding a virus or other potentially damaging program. A Trojan horse can be a program that purports to do one action when, in fact, it is performing a malicious action on your computer. Trojan horses can be included in software that you download for free or as attachments in email messages.
  • 7. What is a Worm? • A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. • Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 8. Boot Sector Virus :- A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk. Macro Virus :- Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.
  • 9. Memory Resident Virus :- Memory Resident Viruses reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes. Root kit Virus :A root kit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term root kit comes from the Linux administrator root user. These viruses are usually installed by Trojans and are normally disguised as operating system files.
  • 10. Polymorphic Virus :Polymorphic viruses contain complex instructions that enable them to mutate into new and different viruses. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption). The virus then goes on creating a large number of copies. Logic Bombs :Logic bombs are often attached to a working program but do not replicate. They are only executed when a certain predefined condition is met. Their objective is to destroy data on the computer once certain conditions have been met.
  • 11. Indications of Virus Attack  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear
  • 12. How To Create a Virus As we know, Virus is nothing it is just a program which are created for malicious purpose. If it occurs in a system & user is unaware of from it then it can destroy or damage our system.
  • 13. Continued.. Open Notepad and write the following code @Echo off Start virus.bat virus.bat save it as .bat and run it. It will hang our computer & we have to shut down the computer forcibly...
  • 14. Protection from Virus  Install reliable anti-virus software  Update our anti-virus software regularly  Don't automatically open attachments  Scan all incoming email attachments  Delete chain emails and junk email  Be careful when downloading files from the Internet
  • 15. Continued…  Always scan new files for viruses before we use them  Backup our files on a regular basis  If our computer is on a network, make sure we have security steps in place to prevent unauthorized users putting files on our computer  Take care using USB flash cards, CDs, zip and floppy disks
  • 16. Examples of risky file types :• The following file types should be treated with suspicion and be confirmed with the sender before being opened: – .exe – .bat – .vbs
  • 17. Remove Some Common Viruses • We can remove some of the common viruses without help of any antivirus Program. • e.g.- New Folder.exe • Autorun.inf ( from PDs etc)
  • 18. New Folder.exe • It looks just like an folder but actually it is a .exe file. • Try to deleting the file. • It will delete if you haven’t executed it, if you’re unable to delete it. • Go to Task manager ( by pressing ctrl+shift+esc )
  • 19. Continued …  Go to Process Tab and try finding that the process for the exe file and end the process.  Then Go to the same folder containing the exe file and delete it.  Then Open Search and try finding the .exe files of same size and delete them all.
  • 20. Removal of Autorun.inf • Open Run dialog Box. Type in “CMD” press ENTER.
  • 21. Continued … • The Command Prompt will Open Now. In Command prompt go to the drive containing Autorun.inf • Now Type In “ attrib –h –s –a” and press enter.
  • 22. Continued … • This will remove drives attributes for all Hidden, System files. • Now Type “ Del autorun.inf” and press ENTER. • The Virus has been Successfully Removed.
  • 23. “It is good to be aware of viruses rather than being sorry…..”
  • 24. Thank You !! Any Queries ??